A software company suspects that employees have set up automatic corporate email
forwarding to their personal inboxes against company policy. The company hires
forensic investigators to identify the employees violating policy, with the intention of
issuing warnings to them.
Which type of cybercrime investigation approach is this company taking?
A Civil
B Criminal
C Administrative
D Punitive
C
Which model or legislation applies a holistic approach toward any criminal activity as
a criminal operation?
A Enterprise Theory of Investigation
B Racketeer Influenced and Corrupt Organizations Act
C Evidence Examination
D Law Enforcement Cyber Incident Reporting
A
What does a forensic investigator need to obtain before seizing a computing device
in a criminal case?
A Court warrant
B Completed crime report
C Chain of custody document
D Plaintiff's permission
A
Which activity should be used to check whether an application has ever been
installed on a computer?
A Penetration test
B Risk analysis
C Log review
D Security review
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |